Title: Unveiling the digital fingerprints: analysis of internet attacks based on website fingerprints

Authors: Blerim Rexha; Arbena Musa; Kamer Vishi; Edlira Martiri

Addresses: Department of Computer Engineering, University of Prishtina, Kodra e Diellit, p.n., 10000 Prishtina, Kosovo ' Department of Computer Engineering, University of Prishtina, Kodra e Diellit, p.n., 10000 Prishtina, Kosovo ' The Norwegian Agency for Local Governments, Haakon VIIs Gate 5b, N-0161 Oslo, Norway ' Department of Statistics and Applied Informatics, University of Tirana, Sheshi 'Nënë Tereza' Nr. 4, Tirana 1010, Albania

Abstract: Anonymity networks are widely used to safeguard user privacy by concealing identifying metadata. However, these networks remain vulnerable to traffic analysis techniques such as website fingerprinting attacks, which can compromise user anonymity. In this study, we explore the effectiveness of several machine learning algorithms in performing such attacks. Using a controlled experimental framework, we analyse a publicly available dataset capturing user network traffic across 11 days. The dataset, recorded in .pcapng format, includes detailed traffic flows from specific web pages. Through comprehensive evaluations, we establish that the gradient boosting machine algorithm achieves the highest accuracy (83.63%) for binary classification, while random forest demonstrates superior performance (62.97% accuracy) for multi-class classification. Our analysis highlights the impact of feature engineering and algorithmic selection on classification outcomes. This work advances the understanding of privacy vulnerabilities within anonymity networks and provides insights into development of more resilient defences.

Keywords: digital fingerprints; website fingerprints; machine learning; user profiling; traffic analysis; web browsing.

DOI: 10.1504/IJICS.2025.148112

International Journal of Information and Computer Security, 2025 Vol.27 No.4, pp.488 - 514

Received: 06 Jan 2024
Accepted: 28 Jan 2025

Published online: 25 Aug 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article